Rule: MISC xdmcp query
--
Sid: 517
--
Summary: A remote user has tried to query the XDMCP service.
--
Impact: Minimal
--
Detailed Information: An XDMCP query can provide a wealth of information
about a host such as a login screen,
a list of users on the host, and to bypass access control restrictions
used by tcpwrapper and to bypass the restriction
of login by user "root" on the box.
--
Affected Systems: Any *Nix server running XDMCP.
--
Attack Scenarios: An attacker can use this to find out information about
the machine and then launch a specific attack such as
a brute force attack.
--
Ease of Attack: N\A
--
False Positives: None Known
--
False Negatives: None Known
--
Corrective Action: Disable XDMCP if not needed.
--
Contributors: Original rule writer unknown.
Josh Sakofsky
--
Additional References: http://www.whitehats.com/info/IDS476
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20030606/93395fd4/attachment.html>